Witsenhausen s counterexample and its links with multimedia security problems
|
|
- Fay Armstrong
- 6 years ago
- Views:
Transcription
1 Witsenhausen s counterexample and its links with multimedia security problems Pedro Comesaña-Alfaro Fernando Pérez-González Chaouki T. Abdallah IWDW 2011 Atlantic City, New Jersey
2 Outline Introduction Witsenhausen s counterexample Approaches to Witsenhausen s problem Links between Witsenhausen and: Watermark detection Authentication Reversible watermarking Conclusions 2
3 Introduction Control: interdisciplinary branch of Engineering, Mathematics and Physics that deals with the behavior of dinamical systems Goal: modify the input of a dinamical system to make the system s output follow a reference value Elements: physical plant and controller Applications to: mechanical, electrical, fluid, chemical, financial, biological systems 3
4 Introduction Stochastic control: randomness is involved in the system input or dynamics Objective of stochastic control: minimize the expected value of a target function Systems with several controllers: centralized, decentralized and distributed control Classical information pattern: all actions performed by the controllers are based on the same data. Any data available at a given time will be also available at all later times 4
5 Introduction Classical pattern: if linear systems, quadratic objective criteria and Gaussian noise are considered, the optimal solution was proven to be an affine function of the system s state Witsenhausen s counterexample: affine control functions are no longer optimal for non-classical information pattern problems 5
6 Witsenhausen s counterexample Proposed in 1968 X Y Z Y^ C 2 Q C 1 W Non-classical, since x known only to the first controller, but not to the second (first similarity with DPC) Target: minimize N 6
7 Witsenhausen s counterexample Witsenhausen approach: Derived the optimal affine solution Compared it with w X sign x x q y tanh x The latter strategy provides strictly smaller values of the target function than the affine one Note that the first controller strategy is a X binary quantization of 7
8 Witsenhausen s counterexample Similarities between Witsenhausen s strategies and watermarking embedding ones Affine solutions and Multiplicative Spread Spectrum: y x y x 1 b Witsenhausen s proposal and QIM y X sign x, i.e., binary antipodal quantization QIM: arbitrary quantization. Typically, regular quantizers, dithered depending on the transmitted information 8
9 Approaches to Witsenhausen s problem BUT: Is the solution proposed by Witsenhausen the optimal one for this problem? NO A large number of papers have been published in the last 43 years improving the controlling strategies for Witsenhausen s counterexample Bansal and Basar (1987): 1/2 w X 2/ sign x x Still binary antipodal quant. w sign x x x : Combination of linear and nonlinear strategies 9
10 Approaches to Witsenhausen s problem Deng and Ho (1999): multilevel quantization Lee et al. (2001): Multilevel quantization, trade-off between C embedding distortion and the estimation difficulty at C By numerical methods: using piecewise linear functions, instead of pure step functions, the target function may be decreased Similar results obtained by Baglietto et al. (2001) and Li et al. (2009)
11 Approaches to Witsenhausen s problem Witsenhausen Binary Quant. Deng and Ho QIM Lee et al. DC-QIM Control Multimedia Security 11
12 Approaches to Witsenhausen s problem Grover and Sahai (2008): Links to Distortion Compensation in Costa s DPC (1983), DC-QIM (2001) and SCS (2003) A generalized multidimensional version of Witsenhausen problem is proposed Connections between Witsenhausen s counterexample and open problems in communications were established Different solutions were proposed depending on the 2 working-point (defined by X 2 and k ) DPC based solutions, the best results achieved so far for Witsenhausen s problem 12
13 Links with watermark detection WM detection is a binary hypothesis test problem Similarities: Non-classical information pattern The input signal (host) is not known at the second controller (blind detector) Constraint on the watermark variance Explicit in watermarking due to imperceptibility constraints, implicit in the target function in Witsenhausen s problem AWGN channel With geometrical consequences on the codes (hyperspheres) 13
14 Links with watermark detection Similarities: Zero-rate problems No additional information is sent (although the problem of sending additional information in Witsenhausen s framework was proposed by Grover and Sahai) The input signal (host) is an intefering factor The larger the host variance, the more difficult to estimate the watermarked signal (for Witsenhausen), or the more difficult to determine if the received signal is watermarked (for zero-bit watermarking) Due to these reasons the techniques proposed for both problems are very similar 14
15 Links with authentication We will focus on those methods that embed into the content the information required for checking the authenticity (no authentication codes, e.g. hashes, sent as additional files) Binary hypothesis test Authentication method by Martinian (2005) Two steps: codeword estimation + host reconstruction Random codebook Fei et al. (2006) Quantization-based method with nested lattices 15
16 Links with authentication Both authentication schemes define a reference channel (the expected channel the watermarked content will go through) Witsenhausen s counterexample also implicitly uses it: If the channel variance were larger than the expected one, estimation errors would arise Important difference: Witsenhausen problem does not care about the system security No attackers 16
17 Links with reversible WM Largest similarity with Witsenhausen s problem: the decoder must perform a signal estimation. BUT: Signal estimation In Witsenhausen the watermarked signal is estimated with NON- NULL ERROR Reversible watermarking estimates the original one, with PERFECT ESTIMATION Reversible watermarking is a multi-bit problem Reversible watermarking typically considers a discrete host alphabet (in Witsenhausen it is Gaussian) Strongly determines the feasible solutions Reversible watermarking does not consider channel noise 17
18 Conclusions Witsenhausen s counterexample was introduced It was shown to be a problem where Dirty Paper Coding techniques can be useful Similarities and differences with respect to several multimedia security problems have been spotted The similarities justify why similar solutions were proposed in apparently so different fields 18
19 Conclusions DPC is suitable for reducing the host (state) interference in a range of frameworks much wider than the one originally proposed by Costa The use of DPC in multimedia security applications where it has not been applied so far (e.g., reversible watermarking, robust hashing, active forensics) seems to be encouraged Although could be non-optimal in those scenarios, Witsenhausen s counterexample shows that a significative gain could be achieved 19
20 Thanks for your attention QUESTIONS? 20
Information Structures, the Witsenhausen Counterexample, and Communicating Using Actions
Information Structures, the Witsenhausen Counterexample, and Communicating Using Actions Pulkit Grover, Carnegie Mellon University Abstract The concept of information-structures in decentralized control
More informationAn Information-Theoretic Analysis of Dirty Paper Coding for Informed Audio Watermarking
1 An Information-Theoretic Analysis of Dirty Paper Coding for Informed Audio Watermarking Andrea Abrardo, Mauro Barni, Andrea Gorrieri, Gianluigi Ferrari Department of Information Engineering and Mathematical
More informationX 1 Q 3 Q 2 Y 1. quantizers. watermark decoder N S N
Quantizer characteristics important for Quantization Index Modulation Hugh Brunk Digimarc, 19801 SW 72nd Ave., Tualatin, OR 97062 ABSTRACT Quantization Index Modulation (QIM) has been shown to be a promising
More informationInformation Embedding meets Distributed Control
Information Embedding meets Distributed Control Pulkit Grover, Aaron B Wagner and Anant Sahai Abstract We consider the problem of information embedding where the encoder modifies a white Gaussian host
More informationDirty Paper Writing and Watermarking Applications
Dirty Paper Writing and Watermarking Applications G.RaviKiran February 10, 2003 1 Introduction Following an underlying theme in Communication is the duo of Dirty Paper Writing and Watermarking. In 1983
More informationImage Data Compression. Dirty-paper codes Alexey Pak, Lehrstuhl für Interak<ve Echtzeitsysteme, Fakultät für Informa<k, KIT
Image Data Compression Dirty-paper codes 1 Reminder: watermarking with side informa8on Watermark embedder Noise n Input message m Auxiliary informa
More informationSparse Regression Codes for Multi-terminal Source and Channel Coding
Sparse Regression Codes for Multi-terminal Source and Channel Coding Ramji Venkataramanan Yale University Sekhar Tatikonda Allerton 2012 1 / 20 Compression with Side-Information X Encoder Rate R Decoder
More informationThe Duality Between Information Embedding and Source Coding With Side Information and Some Applications
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 5, MAY 2003 1159 The Duality Between Information Embedding and Source Coding With Side Information and Some Applications Richard J. Barron, Member,
More informationA Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication
A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication Chuhong Fei a, Deepa Kundur b, and Raymond Kwong a a University of Toronto, 10 King s College Road, Toronto, ON Canada
More informationGeneralized Writing on Dirty Paper
Generalized Writing on Dirty Paper Aaron S. Cohen acohen@mit.edu MIT, 36-689 77 Massachusetts Ave. Cambridge, MA 02139-4307 Amos Lapidoth lapidoth@isi.ee.ethz.ch ETF E107 ETH-Zentrum CH-8092 Zürich, Switzerland
More informationQuantization Index Modulation using the E 8 lattice
1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:
More information2804 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 6, JUNE 2010
2804 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 6, JUNE 2010 Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime Pedro Comesaña, Member, IEEE, Neri Merhav,
More informationUniversity of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena
Multimedia Security Mauro Barni University of Siena : summary Optimum decoding/detection Additive SS watermarks Decoding/detection of QIM watermarks The dilemma of de-synchronization attacks Geometric
More informationCommunication, Computation, and Control: Through the Information Lens
Communication, Computation, and Control: Through the Information Lens Pulkit Grover Stanford University CMU, April 16, 2012. Acknowledgments: C2S2/Interconnect Focus Center (IFC) NSF Center for Science
More informationTCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK. 161, rue Ada, Montpellier cedex 05, France contact:
TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK Marc CHAUMONT 1,2 and Dalila GOUDIA 2 1 University of Nîmes, Place Gabriel Péri, 30000 Nîmes, France 2 Laboratory LIRMM, UMR CNRS 5506,
More informationBernd Girod Information Systems Laboratory Stanford University Stanford, CA , USA
Estimation Of Amplitude Modifications before SCS Watermark Detection Joachim J. Eggers and R. Bäuml Telecommunications Laboratory University of Erlangen-Nuremberg Cauerstrasse 7/NT, 9158 Erlangen, Germany
More informationA Deterministic Annealing Approach to Witsenhausen s Counterexample
A Deterministic Annealing Approach to Witsenhausen s Counterexample Mustafa Mehmetoglu Dep. of Electrical-Computer Eng. UC Santa Barbara, CA, US Email: mehmetoglu@ece.ucsb.edu Emrah Akyol Dep. of Electrical
More informationMultimedia Communications. Scalar Quantization
Multimedia Communications Scalar Quantization Scalar Quantization In many lossy compression applications we want to represent source outputs using a small number of code words. Process of representing
More informationSecurity of Lattice-Based Data Hiding Against the Known Message Attack
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY Security of Lattice-Based Data Hiding Against the Known Message Attack Luis Pérez-Freire*, Fernando Pérez-González, Teddy Furon, Pedro Comesaña Abstract
More informationSpread Spectrum Watermarking. Information Technologies for IPR Protection
Spread Spectrum Watermarking Information Technologies for IPR Protection Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented
More informationQuantization Based Watermarking Methods Against Valumetric Distortions
International Journal of Automation and Computing 14(6), December 2017, 672-685 DOI: 10.1007/s11633-016-1010-6 Quantization Based Watermarking Methods Against Valumetric Distortions Zai-Ran Wang 1,2 Jing
More informationQuantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding
To appear in IEEE Trans. Inform. Theory. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding Brian Chen and Gregory W. Wornell Submitted June
More informationACTIVE CONTENT FINGERPRINTING: SHRINKAGE AND LATTICE BASED MODULATIONS
ACTIVE CONTENT FINGERPRINTING: SHRINKAGE AND ATTICE BASED MODUATIONS Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Taras Holotyak and Fokko Beekhof University of Geneva Computer Science Department 7,
More informationRational Dither Modulation: A High-Rate Data-Hiding Method Invariant to Gain Attacks
1 Rational Dither Modulation: A High-Rate Data-Hiding Method Invariant to Gain Attacks Fernando Pérez-González Ý *, Carlos Mosquera Ý, Mauro Barni Þ and Andrea Abrardo Þ. Abstract A novel quantization-based
More informationPulkit Grover and Anant Sahai*
Int. J. Systems, Control and Communications, Vol. Witsenhausen s counterexample as Assisted Interference Suppression Pulkit Grover and Anant Sahai* Wireless Foundations, Department of EECS, University
More informationImage Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels
Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Anindya Sarkar and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationStructured interference-mitigation in two-hop networks
tructured interference-mitigation in two-hop networks Yiwei ong Department of Electrical and Computer Eng University of Illinois at Chicago Chicago, IL, UA Email: ysong34@uicedu Natasha Devroye Department
More informationWatermark Detection after Quantization Attacks
Watermark Detection after Quantization Attacks Joachim J. Eggers and Bernd Girod Telecommunications Laboratory University of Erlangen-Nuremberg Cauerstr. 7/NT, 9158 Erlangen, Germany feggers,girodg@lnt.de
More informationSecurity Analysis of ISS Watermarking Using Natural Scene Statistics
Security Analysis of ISS Watermarking Using Natural Scene Statistics Dong Zhang 1, Jiangqun Ni 1, Qiping Zeng 1, Dah-Jye Lee 2, and Jiwu Huang 1 1 School of Information Science and Technology, Sun Yat-sen
More informationWavelet Packet Based Digital Image Watermarking
Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in
More informationDigital Watermark Detection in Visual Multimedia Content
Digital Watermark Detection in Visual Multimedia Content PhD Thesis Defense Peter Meerwald Dept. of Computer Sciences, University of Salzburg September 2010 Watermarking Watermarking is a technology to
More informationDouble Sided Watermark Embedding and Detection with Perceptual Analysis
DOUBLE SIDED WATERMARK EMBEDDIG AD DETECTIO WITH PERCEPTUAL AALYSIS Double Sided Watermark Embedding and Detection with Perceptual Analysis Jidong Zhong and Shangteng Huang Abstract In our previous work,
More informationAsymptotically Optimum Universal Watermark Embedding and Detection in the High SNR Regime
Asymptotically Optimum Universal Watermark Embedding and etection in the High SNR Regime Pedro Comesaña, Neri Merhav, and Mauro Barni 1 Abstract The problem of optimum watermark embedding and detection
More informationSCALABLE AUDIO CODING USING WATERMARKING
SCALABLE AUDIO CODING USING WATERMARKING Mahmood Movassagh Peter Kabal Department of Electrical and Computer Engineering McGill University, Montreal, Canada Email: {mahmood.movassagh@mail.mcgill.ca, peter.kabal@mcgill.ca}
More informationLecture 18: Gaussian Channel
Lecture 18: Gaussian Channel Gaussian channel Gaussian channel capacity Dr. Yao Xie, ECE587, Information Theory, Duke University Mona Lisa in AWGN Mona Lisa Noisy Mona Lisa 100 100 200 200 300 300 400
More informationLattices and Lattice Codes
Lattices and Lattice Codes Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology Hyderabad
More informationMMSE estimation and lattice encoding/decoding for linear Gaussian channels. Todd P. Coleman /22/02
MMSE estimation and lattice encoding/decoding for linear Gaussian channels Todd P. Coleman 6.454 9/22/02 Background: the AWGN Channel Y = X + N where N N ( 0, σ 2 N ), 1 n ni=1 X 2 i P X. Shannon: capacity
More informationInformation Hiding and Covert Communication
Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design
More informationA New Measure of Watermarking Security Applied on QIM
Author manuscript, published in "IH - Information Hiding, Berkeley : United States (2012)" A New Measure of Watermarking Security Applied on QIM Teddy Furon 1 and Patrick Bas 2 1 INRIA Research Centre
More informationStabilization over discrete memoryless and wideband channels using nearly memoryless observations
Stabilization over discrete memoryless and wideband channels using nearly memoryless observations Anant Sahai Abstract We study stabilization of a discrete-time scalar unstable plant over a noisy communication
More informationCommunication constraints and latency in Networked Control Systems
Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega
More informationThe Method of Types and Its Application to Information Hiding
The Method of Types and Its Application to Information Hiding Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/ moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7,
More informationPerformance analysis and improvement of dither modulation under the composite attacks
Zhu and Ding EURASIP Journal on Advances in Signal Processing 212, 212:53 http://asp.eurasipjournals.com/content/212/1/53 RESEARCH Open Access Performance analysis and improvement of dither modulation
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationResearch Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking
Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationLecture 7. Union bound for reducing M-ary to binary hypothesis testing
Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing
More informationProbability Bounds for Two-Dimensional Algebraic Lattice Codes
Probability Bounds for Two-Dimensional Algebraic Lattice Codes David Karpuk Aalto University April 16, 2013 (Joint work with C. Hollanti and E. Viterbo) David Karpuk (Aalto University) Probability Bounds
More informationThis is a repository copy of The effect of quality scalable image compression on robust watermarking.
This is a repository copy of The effect of quality scalable image compression on robust watermarking. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/7613/ Conference or Workshop
More informationNOISE can sometimes improve nonlinear signal processing
488 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 2, FEBRUARY 2011 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member, IEEE, and Bart Kosko, Fellow,
More informationA Modified Moment-Based Image Watermarking Method Robust to Cropping Attack
A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia
More informationResearch Article A New QIM-Based Watermarking Method Robust to Gain Attack
International Journal of Digital Multimedia Broadcasting, Article ID 9188, 14 pages http://dx.doi.org/1.1155/214/9188 Research Article A New QIM-Based Watermarking Method Robust to Gain Attack Yevhen Zolotavkin
More informationDigital Image Watermarking Algorithm Based on Wavelet Packet
www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department
More informationLinear and Nonlinear Oblivious Data Hiding
EURASIP Journal on Applied Signal Processing 4:4, c 4 Hindawi Publishing Corporation Linear and Nonlinear Oblivious Data Hiding Litao Gang InfoDesk, Inc., 66 White Plains Road, Tarrytown, NY 59, USA Email:
More informationOn the Effectiveness of Meta-Detection for Countering Oracle Attacks in Watermarking
On the Effectiveness of Meta-Detection for Countering Oracle Attacks in Watermarking Benedetta ondi 1, Pedro Comesaña-Alfaro, Fernando Pérez-González, Mauro Barni 1 1 Department of Information Engineering
More informationHalf-Duplex Gaussian Relay Networks with Interference Processing Relays
Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras
More informationThe Robustness of Dirty Paper Coding and The Binary Dirty Multiple Access Channel with Common Interference
The and The Binary Dirty Multiple Access Channel with Common Interference Dept. EE - Systems, Tel Aviv University, Tel Aviv, Israel April 25th, 2010 M.Sc. Presentation The B/G Model Compound CSI Smart
More informationAre you threatening me? Towards smart detectors in watermarking
Are you threatening me? Towards smart detectors in watermarking Mauro Barni 1, Pedro Comesaña-Alfaro 2, Fernando Pérez-González 2, Benedetta Tondi 1 1 Dept. Information Theory and Mathematics, University
More informationCoding for Digital Communication and Beyond Fall 2013 Anant Sahai MT 1
EECS 121 Coding for Digital Communication and Beyond Fall 2013 Anant Sahai MT 1 PRINT your student ID: PRINT AND SIGN your name:, (last) (first) (signature) PRINT your Unix account login: ee121- Prob.
More informationInterference Alignment at Finite SNR for TI channels
Interference Alignment at Finite SNR for Time-Invariant channels Or Ordentlich Joint work with Uri Erez EE-Systems, Tel Aviv University ITW 20, Paraty Background and previous work The 2-user Gaussian interference
More informationCODING WITH SIDE INFORMATION. A Dissertation SZE MING CHENG
CODING WITH SIDE INFORMATION A Dissertation by SZE MING CHENG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF
More informationML Detection of Steganography
ML Detection of Steganography Mark T Hogan, Neil J Hurley, Guénolé CM Silvestre, Félix Balado and Kevin M Whelan Department of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland ABSTRACT
More informationSTEGOSYSTEMS BASED ON NOISY CHANNELS
International Journal of Computer Science and Applications c Technomathematics Research Foundation Vol. 8 No. 1, pp. 1-13, 011 STEGOSYSTEMS BASED ON NOISY CHANNELS VALERY KORZHIK State University of Telecommunications,
More informationThe Return of the Sensitivity Attack
The Return of the Sensitivity Attack Pedro Comesaña, Luis Pérez-Freire and Fernando Pérez-González Signal Theory and Communications Department University of Vigo, Vigo 36310, Spain {pcomesan, lpfreire,
More informationA Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems
A Framework for Optimizing onlinear Collusion Attacks on Fingerprinting Systems egar iyavash Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Coordinated Science
More informationCoding into a source: an inverse rate-distortion theorem
Coding into a source: an inverse rate-distortion theorem Anant Sahai joint work with: Mukul Agarwal Sanjoy K. Mitter Wireless Foundations Department of Electrical Engineering and Computer Sciences University
More information6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011
6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 On the Structure of Real-Time Encoding and Decoding Functions in a Multiterminal Communication System Ashutosh Nayyar, Student
More informationA vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation
A vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation Pulkit Grover and Anant Sahai Wireless Foundations, Department of EECS University of California
More informationImplicit coordination in two-agent team problems with continuous action sets. Application to the Witsenhausen cost function
Implicit coordination in two-agent team problems with continuous action sets. Application to the Witsenhausen cost function Achal Agrawal, Florian Danard, Benjamin Larrousse, Samson Lasaulce To cite this
More informationShannon s noisy-channel theorem
Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for
More informationA New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality
0 IEEE Information Theory Workshop A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality Kumar Viswanatha, Emrah Akyol and Kenneth Rose ECE Department, University of California
More informationNational University of Singapore Department of Electrical & Computer Engineering. Examination for
National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:
More informationCovert Communication with Channel-State Information at the Transmitter
Covert Communication with Channel-State Information at the Transmitter Si-Hyeon Lee Joint Work with Ligong Wang, Ashish Khisti, and Gregory W. Wornell July 27, 2017 1 / 21 Covert Communication Transmitter
More informationResearch Article A New Scalar Quantization Method for Digital Image Watermarking
Journal of Electrical and Computer Engineering Volume 26, Article ID 929745, 6 pages http://dx.doi.org/.55/26/929745 Research Article A New Scalar Quantization Method for Digital Image Watermarking Yevhen
More informationElectrical Engineering Written PhD Qualifier Exam Spring 2014
Electrical Engineering Written PhD Qualifier Exam Spring 2014 Friday, February 7 th 2014 Please do not write your name on this page or any other page you submit with your work. Instead use the student
More informationCan the sample being transmitted be used to refine its own PDF estimate?
Can the sample being transmitted be used to refine its own PDF estimate? Dinei A. Florêncio and Patrice Simard Microsoft Research One Microsoft Way, Redmond, WA 98052 {dinei, patrice}@microsoft.com Abstract
More informationA New Measure of Watermarking Security: The Effective Key Length
A New Measure of Watermarking Security: The Effective Key Length Patrick Bas, Teddy Furon To cite this version: Patrick Bas, Teddy Furon. A New Measure of Watermarking Security: The Effective Key Length.
More informationSCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University
SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING By Spandana Bodapati Bachelor of Science Jawaharlal Nehru Technological University Hyderabad, India 200 Submitted to the Faculty of the Graduate
More informationScalar and Vector Quantization. National Chiao Tung University Chun-Jen Tsai 11/06/2014
Scalar and Vector Quantization National Chiao Tung University Chun-Jen Tsai 11/06/014 Basic Concept of Quantization Quantization is the process of representing a large, possibly infinite, set of values
More informationNew wrinkle in dirty paper techniques
New wrinkle in dirty paper techniques Brett Bradley, John Stach Digimarc Corporation, 19801 SW 72 nd Ave, Suite 250, Tualatin, OR, USA 97062 ABSTRACT The many recent publications that focus upon watermarking
More informationInformation Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results
Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel
More informationNew communication strategies for broadcast and interference networks
New communication strategies for broadcast and interference networks S. Sandeep Pradhan (Joint work with Arun Padakandla and Aria Sahebi) University of Michigan, Ann Arbor Distributed Information Coding
More informationOn Scalable Coding in the Presence of Decoder Side Information
On Scalable Coding in the Presence of Decoder Side Information Emrah Akyol, Urbashi Mitra Dep. of Electrical Eng. USC, CA, US Email: {eakyol, ubli}@usc.edu Ertem Tuncel Dep. of Electrical Eng. UC Riverside,
More informationChapter 9 Fundamental Limits in Information Theory
Chapter 9 Fundamental Limits in Information Theory Information Theory is the fundamental theory behind information manipulation, including data compression and data transmission. 9.1 Introduction o For
More informationEnergy State Amplification in an Energy Harvesting Communication System
Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu
More informationExercise 1. = P(y a 1)P(a 1 )
Chapter 7 Channel Capacity Exercise 1 A source produces independent, equally probable symbols from an alphabet {a 1, a 2 } at a rate of one symbol every 3 seconds. These symbols are transmitted over a
More informationSupplementary Figure 1: Scheme of the RFT. (a) At first, we separate two quadratures of the field (denoted by and ); (b) then, each quadrature
Supplementary Figure 1: Scheme of the RFT. (a At first, we separate two quadratures of the field (denoted by and ; (b then, each quadrature undergoes a nonlinear transformation, which results in the sine
More informationDigital Signal Processing
Digital Signal Processing 23 (2013 635 645 Contents lists available at SciVerse ScienceDirect Digital Signal Processing www.elsevier.com/locate/dsp Stochastic signaling in the presence of channel state
More informationOn Sequential Watermark Detection
On Sequential Watermark Detection R. Chandramouli and Nasir D. Memon Abstract This paper introduces a new watermark detection paradigm based on sequential detection. It is shown that this framework leads
More information4 An Introduction to Channel Coding and Decoding over BSC
4 An Introduction to Channel Coding and Decoding over BSC 4.1. Recall that channel coding introduces, in a controlled manner, some redundancy in the (binary information sequence that can be used at the
More informationUTA EE5362 PhD Diagnosis Exam (Spring 2011)
EE5362 Spring 2 PhD Diagnosis Exam ID: UTA EE5362 PhD Diagnosis Exam (Spring 2) Instructions: Verify that your exam contains pages (including the cover shee. Some space is provided for you to show your
More informationRECENT advances in technology have led to increased activity
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 49, NO 9, SEPTEMBER 2004 1549 Stochastic Linear Control Over a Communication Channel Sekhar Tatikonda, Member, IEEE, Anant Sahai, Member, IEEE, and Sanjoy Mitter,
More informationROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION
ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION D. SIMITOPOULOS, A. OIKONOMOPOULOS, AND M. G. STRINTZIS Aristotle University of Thessaloniki Electrical
More informationLecture 4. Capacity of Fading Channels
1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February
More informationEncoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels
Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels LEI BAO, MIKAEL SKOGLUND AND KARL HENRIK JOHANSSON IR-EE- 26: Stockholm 26 Signal Processing School of Electrical Engineering
More informationOn the Capacity of the Two-Hop Half-Duplex Relay Channel
On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,
More informationLattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function
Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Dinesh Krithivasan and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science,
More informationCoset Decomposition Method for Decoding Linear Codes
International Journal of Algebra, Vol. 5, 2011, no. 28, 1395-1404 Coset Decomposition Method for Decoding Linear Codes Mohamed Sayed Faculty of Computer Studies Arab Open University P.O. Box: 830 Ardeya
More informationNetwork Coding and Schubert Varieties over Finite Fields
Network Coding and Schubert Varieties over Finite Fields Anna-Lena Horlemann-Trautmann Algorithmics Laboratory, EPFL, Schweiz October 12th, 2016 University of Kentucky What is this talk about? 1 / 31 Overview
More informationISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security
The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian
More informationAn Introduction to (Network) Coding Theory
An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history
More information